In: Computer Science
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
Especially in IT world the management having security policies ans procedures that document and manage access to critical data and technology. these security policies like firewall settings, unauthorisation, limitation of data, having special credentials to login within an organisation helping to an organisation to secure the data.
Unauthorised acess, unauthorised tampering, denial of service these kind of threats are there in present organisations. however controlling the access is crucial thing. now a days people can easily hack the data of organisations. even the meta data is not secured. so the authentication control methods are necessary to secure the data.
some of the authentication metods:
Security threats, encrypting attributes, designing strong password policies, analysing your security needs, securing connections with SSl, prevent authentication by inactivating the account, other security resources.
we have to analyse all the authentication methods and password policies. and monitor the users authorisation. unauthorisation can be occur from within an organisation or it can be from outside resource so access control methods needs to be irradicate these kind of problems.